Centralized Logging
Ensure member server logs are forwarded to a SIEM. Silver tickets are only visible on the target endpoint.
DCSync is not a vulnerability but the abuse of a legitimate feature. An attacker with sufficient privileges (typically Domain Admin or similar) mimics a Domain Controller (DC) to request password hashes from another DC.
Using the Directory Replication Service Remote Protocol (MS-DRSR), the attacker can pull the NTLM hash of any account, most importantly the krbtgt account hash, which is the foundation for further Kerberos attacks.
A Golden Ticket is a forged Ticket Granting Ticket (TGT). To create it, the attacker needs the krbtgt account hash, obtained via DCSync or LSASS dump on a DC.
krbtgt account. This invalidates current TGTs but allows for a transition period.A Silver Ticket is a forged Service Ticket (TGS). It targets a specific service on a specific server (e.g., CIFS on a file server).
| Attack Type | Target Component | Stealth Level | Key Evidence Source |
|---|---|---|---|
| DCSync | AD Replication | Medium | Network IDS / DC Event 4662 |
| Golden Ticket | Kerberos TGT | High | DC Event 4769 (Anomaly) |
| Silver Ticket | Kerberos TGS | Critical | Member Server Event 4624 |
Centralized Logging
Ensure member server logs are forwarded to a SIEM. Silver tickets are only visible on the target endpoint.
Least Privilege
Strictly limit accounts with replication rights to prevent unauthorized DCSync execution.